Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Wang, Guojun. (Editor ), Atiquzzaman, Mohammed. (Editor ), Yan, Zheng. (Editor ), Choo, Kim-Kwang Raymond. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 10658
Materias:
LEADER 08935nam a22004335i 4500
001 000291071
005 20210915135503.0
007 cr nn 008mamaa
008 171211s2017 gw | s |||| 0|eng d
020 |a 9783319723952 
024 7 |a 10.1007/978-3-319-72395-2  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Security, Privacy, and Anonymity in Computation, Communication, and Storage :  |b SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings /  |c edited by Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XVI, 855 p. 314 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 10658 
505 0 |a The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self – similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical Analysis on System Adoption and Acceptance: A Review -- A Novel Bivariate Entropy-based Network Anomaly Detection System -- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance -- Neural Network based Web Log Analysis for Web Intrusion Detection -- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017) -- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach -- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis -- Cloud Ownership and Reliability – Issues and Developments -- A Trust-based Service Self-Organizing Model for Cloud Market -- A Reliable Resource Scheduling for Network Function Virtualization -- On Global Resource Allocation in Clusters for Data Analytics -- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors -- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017) -- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks -- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways -- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things -- Localizing Wireless Jamming Attacks with Minimal Network Resources -- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017) -- An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm -- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm -- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET) -- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design -- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home -- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks -- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer organization. 
650 0 |a Artificial intelligence. 
650 1 4 |a Security. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Information Systems and Communication Service. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Artificial Intelligence. 
700 1 |a Wang, Guojun.  |e editor.  |0 (orcid)0000-0001-9875-4182  |1 https://orcid.org/0000-0001-9875-4182 
700 1 |a Atiquzzaman, Mohammed.  |e editor. 
700 1 |a Yan, Zheng.  |e editor.  |0 (orcid)0000-0002-9697-2108  |1 https://orcid.org/0000-0002-9697-2108 
700 1 |a Choo, Kim-Kwang Raymond.  |e editor.  |0 (orcid)0000-0001-9208-5336  |1 https://orcid.org/0000-0001-9208-5336 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks